We advise users to be wary of scanned documents or (fake) invoice/payment requests that look like PDF's or normal documents (Word, Excel,...) but in reality contain viruses and malware, among which cryptolockers. A cryptolocker will encrypt all documents on the affected computer and attached drives, thus rendering those documents useless. So be extremely vigilant when receiving messages with attachments, from any source. DO NOT OPEN THESE ATTACHMENTS!

There seems to be a continuous campaign ongoing to send users (fake) invoice or payment requests and the likes which seemingly urge the recipient to take action.

The emails are sent from legitimate companies or third parties. The details on what the user should do, or details about the invoice or Windows Update, are supposedly included in an attachment or in a hyperlink that will download a "document" to the computer.

The document or attachment, which can be hidden in a zip file, is frequently disguised as a PDF, when in reality it is an executable program that, upon opening, executes the virus (trojan) on the computer and encrypts all documents on the computer and mounted shares/disks, making all the documents useless. In short: the user will lose all his/her files.

Therefore, be extremely vigilant upon receiving messages with attachments, in particular if you use a computer with Windows.

If you have any doubt about a message with an attachment you have received, contact the ICT-Helpdesk.

If you are locked out of your computer or your documents have become inaccessible, immediately contact the ICT-Helpdesk. Do not try to fix the problem yourself or to restore your files from your backup, or you risk losing your backup as well.

Dear Sir,Please note that we cannot continue to contact you concerning our over due payment.We need our money and very soon, we will invite the police to your office for arrest.Find attached documents which you signed and kindy selttle your debts assoon as possible.

Ransomware viruses are computer viruses (trojans) that, upon execution, will lock out the user from his/her computer, or, even worse, encrypt all documents on the computer and mounted shares, making those documents useless.

The virus will display a message on the computer that one should transfer a certain amount of money in order to regain access to the computer or documents. There is however no guarantee that this will actually be the case.